If you consider the amount of attempts to hack into government systems and databases, and how many times your personal information is compromised – you’d understand just how important application security really is. The following infographic from Veracode details some of the biggest hacking attempts in recent history and the work behind the scenes to… Continue reading App security: how important is it?
There’s been a lot of focus, especially in the past year, on internet censorship. From the battle against online piracy to the recent use of Facebook and social media channels to apprehend criminals, many people are stopping to wonder where their privacy ends on the Internet – in my humble opinion, it starts and ends… Continue reading Censorship on the internet: be your own watchdog
If reports from the hacker group are to be believed, the FBI has over 12 million Unique Device Identifiers (UDIDs) on file and now 1,000,001 of them have been leaked to the public. Using the AtomicReferenceArray vulnerability in Java, the group allegedly hacked into Supervisor Special Agent Christopher K Stangl’s notebook in March of this… Continue reading Hacker group AntiSec leaks Apple device IDs to highlight FBI tracking
The fear of hackers and privacy peeping toms has been quelled for the moment due to the unveiling of a new two-factor account authentication by Dropbox, a cloud storage company used by social marketing firms and individuals alike. Earlier this month it was reported International Business Times that the cloud storage company Dropbox had a… Continue reading Should two-factor authentication be utilized for all your accounts?
With less than $50 of store-bought hardware and some programming, a hacker can gain instantaneous and untraceable access into over four million hotel rooms around the world, according to Cody Brocious, a Mozilla software developer. He details his findings on his website. The time it takes once installed: around 200 milliseconds. “With how stupidly simple… Continue reading Hotel keycards can be easily hacked in 200 milliseconds
Quiz time: Did you know that a burglary occurs every 14.6 seconds in America? With the average dollar loss from a robbery up to $2,119, homeowners and renters need to take caution. While there are many different security measures you can put into place, you need to make sure your home is properly protected. Today’s… Continue reading Top 5 security systems for 2012
Hackers are becoming increasingly clever and conniving, while small businesses remain shockingly naive about the threat they face from cyber-attacks. This infographic conveys a clear message to all small businesses worldwide: You’re not as secure as you think. Far too many small businesses mistakenly believe that they are simply too small to be on hackers’… Continue reading Small businesses must take preventative measures to safeguard against hackers
WiFi has changed the world. We are no longer locked into proximity to wall outlets. We’re not tied down by physical cords. We can roam our house, our area, our cities. We can go to coffee shops and book stores and connect very easily. It has been a wonderful bit of technological progress that has… Continue reading WiFi security facts and figures
Sensitive data has always been a challenge to deliver securely. Even in the days of the Spartans, military commanders would use ingenious encryption techniques to communicate with each other across distances. Today, we have an ongoing battle for data security that pits the brilliant minds of encryption experts with the equally-brilliant hackers trying to get… Continue reading The history of encryption
As the madness of the holiday season dies down and the New Year gains pace, retailers will renew the cycle of offering new attractions to entice shoppers into parting with their hard-earned cash in exchange for physical and digital goodies. From New Year’s Eve to Valentine’s Day, there is no lack of opportunities for shoppers… Continue reading Will online shopping ever be safe?